Koniku Kore computer could sniff out explosives

The neuron-based device was built by Nigerian Oshi Agabi and shown off at TEDGlobal

A computer based on mice neurons has been revealed that can "smell" explosives in the same way dogs can detect cancer in their human counterparts, making it a vital piece of kit for the computing world.

Nigerian researcher Oshi Agabi developed the Koniku Kore technology that he believes could be the basis of AI and computing of the future, reverse-engineering biology to make a computer as smart as a human - or mouse, in this case - for detecting hostile environments.

Announced at the TEDGlobal conference taking place in Tanzania, he explained that although machines are very good at processing millions of mathematical equations concurrently, faster and more accurately than a human, nothing comes close to the brain's cognitive functions.

He set out to combine the key features of the human brain with silicon to develop a smart machine that can, in this case, detect smells and alert users. 

Advertisement
Advertisement - Article continues below

"Biology is technology. Bio is tech," he told attendees at the conference. "Our deep learning networks are all copying the brain....You can give the neurons instructions about what to do - in our case, we tell it to provide a receptor that can detect explosives."

Agabi explained the neurons used to develop the technology have been taken out of the lab and will survive for months. However, he has complete faith that such technology could be used with a much longer shelf life in future.

"We think that the processing power that is going to run the robots of the future will be synthetic biology-based and we are laying the foundations for that today," he said.

Although it's only a concept at present (although it does actually work to a very sophisticated degree), Agabi explained that it could be used for a wide array of functions, including at airport security gates and other places where bombs are a real threat to human life.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/cloud/amazon-web-services-aws/354223/what-to-expect-from-aws-reinvent-2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019
Visit/hardware/354232/raspberry-pi-4-owners-complain-of-broken-wi-fi-when-using-hdmi
Hardware

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019